CYBER CELL, PALAKKAD


 9497976007  cbrcelpkd.pol@kerala.gov.in

Cyber Cell is functioning in District Police Head Quarters under the direct control of District Police Chief, Palakkad.
From 2014 onwards this cell is functioning as a special unit with a sanctioned strength of 1 SI, 1 ASI, 4 SCPOs and 1 CPO.At present Cyber cell is not entrusted with the investigation of cases or enquiry of petitions directly. The petitions received in this cell are forwarding to the concerned Police Station for initiating legal action. Cyber Cell provides all necessary assistance to the Investigating Officers for collecting digital evidences.
In addition to the day to day routine work, officials of Cyber Cell conducts awareness classes to the school and college students with a view to educate the new generation about the possible threats from cyber space and make them aware about the Cyber laws like Information Technology Act 2008 and also educating them to develop good morality in using electronic networks.
Palakkad Cyber Cell is now Women and Children Friendly
.
Considering the fact that most of the victims in Cyber Space are women and children, women and children friendly atmosphere have been created in Cyber Cells functioning in Kerala by providing the service of Women Police Officers. This Project was introduced by Sri. Loknath Behera. IPS, the State Police Chief of Kerala
As part of this project service of Woman Police Officer is now available in Cyber Cell, Palakkad. Women and Children who are residing in Palakkad District can share their grievances connected with cyber related matters with this officer and obtain remedies for their problems.
Cyber Security Tips
Following security tips helps an individual to use his Computer and related accessories securely and efficiently.Remember these tips while you are working with a computer, or while accessing Internet.
Use anti-virus software.
A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
Be a responsible cyber citizen.
If you use the Internet, you're a citizen of a global community&mdasha netizens. Just like being a citizen of your local community, being a netizens has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws.
Do not open email from unknown sources.
Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension&mdasheven if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe.
Back-up your computer regularly.
Help your family back up all household computers onto external media such as CD&rsquos or diskettes.
Regularly download security protection update &ldquopatches&rdquo.
Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own.
Use passwords for protection
You wouldn't leave sensitive documents laying out for prying eyes likewise, you need to put away the information stored on your computer in a safe place: locked behind a password in your own user account.
&bull    Agree what types of sites are permissible (or safe) to access
&bull    Don't reveal your password to others
&bull    Don&rsquot open e-mails from people whom you don&rsquot know
&bull    Don&rsquot trust anyone online while using chat, e-mail or other online services.
&bull    Don't give out personal information, photos, family details online
&bull    Uncomfortable mails may be reported to parents or authorities
&bull    Avoid face-to-face meetings with online friends
&bull    Be aware of copyright issues while using the online information.
&bull    Don&rsquot click links or URLs that look suspicious
&bull    Avoid downloading free software which may contain viruses
MOBILE PHONE &ndash Dos AND Don&rsquots
&bull    Do not use or buy a used SIM card.
&bull    Make sure your SIM card is bought and registered under your name with your permanent address
&bull    Do not lend your mobile phone
&bull    Password protect the phone if the facility is available in the handset
&bull    Do not use the mobile for obscene/pornographic images, videos or SMS and MMS
&bull    Do not assume that any crime done with your mobile is undetectable
&bull    Take care when using your phone in public places &ndash do not flash it around
&bull    Avoid leaving your phone unattended - treat it like you would treat your wallet or purse
&bull    Make a note of the mobile's serial number - you can find it by typing *#06# on your phone. The serial                 number can help to track the mobile if it's ever stolen / lost.
&bull    Call the service provider immediately, in case your mobile phone is stolen. They will block use of the stolen SIM card in their network
&bull    Report it to the police as soon as the crime occurs
&bull    Do not buy second hand mobile handsets without having any knowledge about the user of the device
&bull    Do not give your mobile phone numbers while chatting over the internet to avoid stalking. And do not lend it        either
Mobile Phone Ethics
&bull    Turn your cell phone off when you are at the movies or at least don't check the messages &ndash people around        you will be disturbed by the screen light up
&bull    Maintain at least a 10-foot zone from anyone while talking
&bull    Never talk in elevators, libraries, museums, restaurants, cemeteries, theaters, dentist or doctor waiting               rooms, places of worship, auditoriums or other enclosed public spaces, such as hospital emergency rooms       or buses
&bull    And don't have any emotional conversations in public, ever
&bull    Don't use loud and annoying ring tones that destroy concentration and eardrums
&bull    Never "multi-task" by making calls while shopping, banking, waiting in line or conducting other personal             business
INTERNET HACKING HAPPENS
&bull    Attacking computers that don&rsquot have wire walls installed
&bull    Installing keystroke loggers or other malicious code by hiding it in email attachments
&bull    Exploiting browser vulnerabilities that have not been properly patched
&bull    Exploiting weak or poorly protected passwords
&bull    Hiding malicious code in downloads or free software
&bull    Hiding malicious code in images on web sites and waiting for unsuspecting users to click on them
&bull    Employees or other trusted users simply accessing an unprotected computer
&bull    Exploring poorly installed networks, and especially wireless home networks
SOLUTIONS
&bull    Make sure the computer(s) you use in your home or office have the latest fire walls and anti-virus software       installed
&bull    Keep up to date with the latest patches, especially for your browser
&bull    Use a good quality anti-spyware solution and scan your computers regularly
&bull    Be careful about the type of web sites you visit, who you click on and what you download
OFFENCES AND PUNISHMENTS UNDER IT ACT 2008
&bull    Tampering Computer Source Documents - Section 65 (3 Yrs, 2 lakh)
&bull    Punishment for offences committed u/s 43 (3 yrs., 5 lakh)
&bull    Receiving stolen computer resource/communication device &ndash Section 66 B (3 yrs., 1 lakh)
&bull    Identity theft &ndash Section 66 C (3 yrs, 1 lakh)
&bull    Cheating by impersonation using computer resources&ndash 66 D (3 yrs. , 1 lakh)
&bull    Violation of privacy &ndash Section 66 E (3 yrs, 2 lakh)
&bull    Cyber terrorism &ndash Section 66 F (Life imprisonment)
&bull    Publishing or transmitting obscene materials in electronic form &ndash Section 67 (1st con. &ndash 3 yr, 5 lakh, 2nd con &ndash 5 yr , 10 lakh)
&bull    Publishing or transmitting of material containing sexually explicit act in electronic form &ndash 67 A (5 yr. 10 lakh) 2nd con 7 yrs. 10 lakh)
&bull    Publishing/transmitting of materials depicting children in sexually explicit act in electronic form &ndash 67 B (5 yrs 10 lakh 2nd con. 7 yrs 10 lakh)
TIPS FOR USING INTERNET
&bull    Agree what types of sites are permissible (or safe) to access
&bull    Don't reveal your password to others
&bull    Don&rsquot open e-mails from people whom you don&rsquot know
&bull    Don&rsquot trust anyone online while using chat, e-mail or other online services
&bull    Don't give out personal information, photos, family details online
&bull    Uncomfortable mails may be reported to parents or authorities
&bull    Avoid face-to-face meetings with online friends
&bull    Be aware of copyright issues while using the online information
&bull    Don&rsquot click links or URLs that look suspicious
&bull    Avoid downloading free software which may contain viruses
Shopping Safely Online Security Tips
Why do online shoppers have to take special precautions?
&bull    The Internet offers convenience not available from other shopping outlets. From the comfort of your home, you can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else.
How do attackers target online shoppers?
There are three common ways that attackers can take advantage of online shoppers:-
&bull    Creating fraudulent sites and email messages &ndashUnlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites or email messages that appear to be legitimate. Attackers may also misrepresent themselves as charities, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information
&bull    Intercepting insecure transactions &ndash If a vendor does not use encryption, an attacker may be able to intercept your information as it is transmitted
&bull    Targeting vulnerable computers &ndashIf you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases.
How can you protect yourself?
&bull    Do business with reputable vendors &ndashBefore providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information. (See Avoiding Social Engineering and Phishing Attacks and Understanding Web Site Certificates for more information.) Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the "issued to" information. Locate and note phone numbers and physical addresses of vendors in case there is a problem with your transaction or your bill.
&bull    Make sure your information is being encrypted &ndashMany sites use secure sockets layer (SSL) to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. The location of the icon varies by browser for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser.
&bull    Be wary of emails requesting information &ndash Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email. If you receive an unsolicited email from a business, instead of clicking on the provided link, directly log on to the authentic website by typing the address yourself.
&bull    Use a credit card &ndash There are laws to limit your liability for fraudulent credit card charges, but you may not have the same level of protection for your debit cards. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can minimize potential damage by using a single, low-limit credit card to making all of your online purchases. Also use a credit card when using a payment gateway such as PayPal, Google Wallet, or Apple Pay.
&bull    Check your shopping app settings &ndash Look for apps that tell you what they do with your data and how they keep it secure. Keep in mind that there is no legal limit on your liability with money stored in a shopping app (or on a gift card). Unless otherwise stated under the terms of service, you are responsible for all charges made through your shopping app.
&bull    Check your statements &ndash Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately
&bull    Check privacy policies &ndash Before providing personal or financial information, check the website's privacy policy. Make sure you understand how your information will be stored and used.
 

Last updated on Friday 3rd of June 2022 PM